Chapter 4
Which of the following is the most common reason that business systems fail?
Data quality
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?
Digital Millennium Copyright Act
Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations?
Digital divide
___is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.
Due process
Software programs were unprotected by copyright law until the early 1990s.
False
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
HIPAA
Which of the following best describes the effect that new information technology has on society?
It has a ripple effect, raising new ethical, social, and political issues.
A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles?
Kant's Categorical Imperative
The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age?
Quality of life
___means that you accept the potential costs and obligations for the decisions you make.
Responsibility
Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?
Trade secret
Advances in data storage and rapidly declining data storage costs have been responsible for multiplying databases on individuals maintained by private and public organizations.
True
Because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations.
True
Computer abuse refers to acts involving a computer that may not be illegal but are considered unethical.
True
Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior.
True
Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.
True
Web beacons are tiny, invisible software programs hidden in email messages and web pages that are used to track and report a user's online behavior.
True
The ethical "no free lunch" rule states that:
if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.
When a cookie is created during a website visit, it is stored:
on the hard drive of the visitor's computer.
All of the following laws apply to actions by the federal government except:
the Children's Online Privacy Protection Act.